Systems and methods for distributing and securing data
First Claim
1. A method for recovering data from a collection of purported shares comprising:
- receiving a designated purported share of the collection of purported shares, wherein the designated purported share is asserted to be valid;
separating each purported share into a content portion and a vector of checksums;
using the vector of checksums associated with the designated purported share to classify each share of the collection of purported shares as an actual share or as a bogus share; and
applying a recovery algorithm of a computational secret sharing scheme to the shares classified as actual shares to recover the data.
5 Assignments
0 Petitions
Accused Products
Abstract
A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and then shared using a secret sharing algorithm to generate a collection of key shares. The private data may be encrypted using the key, resulting in a ciphertext. The ciphertext may then be broken into ciphertext fragments using an Information Dispersal Algorithm. Each key share and a corresponding ciphertext fragment are provided as input to a committal method of a probabilistic commitment scheme, resulting in a committal value and a decommittal value. The share for the robust computational secret sharing scheme may be obtained by combining the key share, the ciphertext fragment, the decommittal value, and the vector of committal values.
135 Citations
14 Claims
-
1. A method for recovering data from a collection of purported shares comprising:
-
receiving a designated purported share of the collection of purported shares, wherein the designated purported share is asserted to be valid; separating each purported share into a content portion and a vector of checksums; using the vector of checksums associated with the designated purported share to classify each share of the collection of purported shares as an actual share or as a bogus share; and applying a recovery algorithm of a computational secret sharing scheme to the shares classified as actual shares to recover the data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification